Methods to test the responses of software and web applications to unusual or unexpected inputs are known as:
Which of the following application security testing techniques is implemented when an automated system generates random input data?
Which of the following describes purposefully injecting extra input during testing, possibly causing an application to crash?